Professional Documents
Culture Documents
CC0002 Quiz PREP Solutions
CC0002 Quiz PREP Solutions
Introduction To Excel
E. All the other functions are available in the new version of Excel.
C.
A is an abstraction process because we want to look for the most important details in a
complex subway map.
B is an algorithmic thinking process because we are following a step-by-step process for
baking a cake.
C is a pattern recognition process because we have identified the shared similarities in
the problem where all the students are different in many aspects.
D is a process of decomposition by breaking down to different systems in a complex
human body.
4. Mr. Lim wants to purchase a housing property in Singapore. Which computational thinking
method is best applicable in this situation if he wants a housing property that costs lower
than his budget?
a. Decomposition
b. Pattern Recognition
c. Algorithmic Thinking
d. Abstraction
C. Multiple predictors are used to increase reliability and accuracy, but this does not
mean the prediction will always be true.
Managing Cybersecurity
D.
Level 1: open;
Level 2: restricted;
Level 3: confidential;
Level 4: classified. Level 4 deals with information that can cause damages to national
security.
8. What is the importance of managing cybersecurity?
a. Securing works of data that we use from unauthorized access or even malicious attacks
b. Protect businesses that are prone to cyberattacks
c. Protects individuals’ personal sensitive information such as financial data that can be
sold for profit
d. All of the above
11. What function does the NTU Cyber Security Team have?
a. Governance
b. Engineering
c. Defense
d. All of the above
D.
NTU Cyber Security Governance: development and maintenance of policies
NTU Cyber Security Engineering: explore technologies to enhance security capabilities
NTU Cyber Security Defense: manage 24/7 security operation centre (SOC) to detect
and respond to any cyber-attacks
13. Which is NOT a possible reason why people may ignore fake news on social media?
a. The topic is irrelevant to them
b. They think that taking action will not have any impact
c. They do not want to hurt the feelings of those who posted the incorrect post
d. They believe that the fake news will be taken down eventually
14. Which of the following could be reasons for using deepfake with malicious intent?
a. All of the options
b. Influence stock price
c. Influence election results
d. To undermine reputation of a product
C.
Morally permissible when three conditions are fulfilled:
1. The firm…will do [or has done] serious and considerable harm to employees or to the
public;
2. Once employees identify a serious threat to the user of a product or to the general
public, they should report it to their immediate superior and make their moral concern
known;
3. If one's immediate supervisor does nothing effective about the concern or complaint,
the employee should exhaust the internal procedures and possibilities within the firm.
Morally obligatory when two additional conditions are fulfilled:
4. The whistle blower must have, or have accessible, documented evidence that would
convince a reasonable, impartial observer that one's view of the situation is correct; and
5. The employee must have good reasons to believe that by going public the necessary
changes will be brought about. The chance of being successful must be worth the risk
one takes and the danger to which one is exposed.
Objections
1.too stringent (can be morally permissible without fulfilling the 3 conditions)
2.not demanding enough (can be morally obligatory without fulfilling the 2 conditions)
18. What does NTU’s Ethics and Compliance Committee (ECC) do?
a. Whistle blowing channel
b. Forms ethical guidelines
c. Ban any unethical use of data
d. None of the above
A. The Ethics and Compliance Committee (ECC) will consider and investigate any
legitimate concern or incident raised, or information provided in connection with
the concern/incident, which was submitted through the whistle-blowing form.
19. Mary has confidential information about the Singapore Computer Society’s members’
contacts. Her husband asked her for the contacts so that he can sell computers to the
members. Mary agreed. Which code of conduct did she violate?
a. Not seek personal advantage to the detriment of the society
b. Act with complete discretion when dealing with confidential information
c. Be impartial when giving advice and disclose any relevant personal interests
d. All of the above
D. Copyright is the right to prevent unauthorised copying of the tangible form in which
a person has chosen to express his/her ideas. Ideas and concepts are unprotectable
material not covered under copyright law.
21. A company created an application. Which intellectual property should it be protected under?
a. Patent
b. Literary Copyright
c. Artistic Copyright
d. Trademark
C. Most copyright durations last for 70 years, except broadcasts such as TV, radios, cable
programmes last for 50 years while published editions last for 25 years.
23. Dason went to a professional networking website. Which of the following information can
he not provide?
a. Name and phone number
b. Email
c. Education profile
d. All of the options
24. Solar Inc. developed a new technology that can drastically reduce the cost of solar panels.
Which intellectual property is this invention protected under?
a. Copyright
b. Patent
c. Registered design
d. Trademark
26. A company came out with a new drug to defeat COVID-19. What would a normal company
do first?
a. File for copyright for all data gathered
b. File for non-disclosure and apply for patent
c. File for a license
d. File for a trademark
27. What intellectual property is the recipe for Coca Cola considered as?
a. Trade secret (confidential information)
b. Patent
c. Copyright
d. Trademark
A. Option B is a new type of paper clip while option c is a software code. D is a made-
up word with a brand name.
28. For an intellectual property assignment, which statement is false?
a. An assignment is another type of contract where the assignor transfers all entitlement
and ownership rights that are the subject of the assignment to the assignee, which
becomes the new owner of the property.
b. The contract must be in writing.
c. The contract must be signed by or on behalf of the assignor.
d. An assignment is cheaper than a license.
D. IP law (1) provides motivation for creators, (2) encourages constant creation and
innovation, (3) allows creators to exploit their works for commercial gain, (4) allows
creators to defend their works from infringement.
B. PDPC stands for Personal Data Protection Commission that promotes and enforces
personal data protection to foster an environment of trust among businesses and
consumers in Singapore.
32. The Personal Data Protection Act (PDPA) has what objectives?
a. Safeguard personal data from misuse and to maintain individuals’ trust in organisations
that manage their data
b. Regulating flow of personal data among organisations
c. Strengthen Singapore's position as a trusted hub for businesses
d. All of the options
D.
The PDPA recognises both the need to protect individuals’ personal data and the need of
organisations to collect, use or disclose personal data for legitimate and reasonable
purposes.
A data protection regime is necessary to safeguard personal data from misuse and to
maintain individuals’ trust in organisations that manage their data. (Objective 1)
By regulating the flow of personal data among organisations, the PDPA also aims to
strengthen Singapore’s position as a trusted hub for businesses. (Objective 2 and 3)
A. Although there has always been interest in AI since the 1950s, not much progress
was achieved. However, in recent years, the renaissance of AI occurred, primarily due to
3 reasons:
1. Powerful computers
- Access to high performance computing machines, which was not available in the
past.
2. Big data
- Availability of a large amount of data that can be collected, due to the ubiquity of
devices
3. Software algorithms
- Advancements made in more sophisticated algorithms allowed for machine learning
and deep learning, e.g. learning based on deep neural networks.
Interest in the concept of AI has always been existent, so it is not a contributory factor
for advancement in AI in modern day.
Examples of the popular neural networks used in deep learning include the following:
1. Artificial Neural Network (ANN), used for classifying numbers-based data
2. Convolution Neural Network (CNN), used for classifying images
3. Recurrent Neural Network (RNN), used for time series data such as audio
Deep Reinforcement Learning is a combination of reinforcement learning and
deep learning. Transfer Learning is where a model trained on one task is
repurposed for other/certain related tasks. It is used in deep learning.
36. Which of the following is a form of supervised learning?
a. Expected results of the data, labelled with the input data, are fed into the machines
b. Only the input data that is not labelled is input into the machine
c. Use of ‘agent’ to learn to maximise ‘reward’ in an environment
d. None of the options
A.
Machine learning: A large amount of data is needed to train the machine in order for it
to learn about the data. There are three broad/popular approaches used in machine
learning.
1. Supervised learning, where the expected output results of the data, labelled with
the input data, are fed into the machines. Some of the techniques used in supervised
learning include regression and classification.
2. Unsupervised learning, where only the input data is input into the machine for
the machine to find a pattern within the data. An example of this approach is
clustering.
3. Reinforcement learning, where the objective is not to find a pattern, but to
maximise rewards/achieve a goal within the application environment.
37. Which of the following learning saves time from repeatedly crafting and modelling
algorithms to do similar tasks?
a. Deep Learning
b. Deep Reinforcement Learning
c. Transfer Learning
d. Supervised Learning
D. The neural network refers to the input, hidden and output layers, thus option D is
incorrect.
B. ANN is used for classifying numbers-based data, CNN is used for classifying images
and RNN is used for time series data such as audio.
40. What are the current generation of AI technologies considered as?
a. Artificial Narrow Intelligence
b. Artificial General Intelligence
c. Artificial Smart Intelligence
d. Artificial Wide Intelligence
Blockchain
B. The hash function is a mathematical algorithm that transforms any kind of message
into a bit array of a fix sized (the “hash value”), regardless of the size of the input
message. It is a one-way, deterministic function and is infeasible to invert. Option C
refers to a deterministic function that is the one that produces the same output for the
same input every single time. The opposite of a deterministic function is a probabilistic
function.
D.
Reason 1: Cryptographic system which uses cryptographic hashes.
Once a block is created on the chain, it cannot be modified. Any modification to old data
will result in a completely different hash. However, it is possible to add new information
to the blockchain. This restricts people from reversing any transaction that has already
taken place.
Reason 2: Transparency of blockchain
All transactions on the network are accessible to the public and can be inspected by
anyone, making it easy to detect fraudulent blocks.
Reason 3: Decentralisation of blockchain
Decentralisation of blockchain means that there is no single point of failure. In the event
that something goes wrong on one server, there are other servers to refer to.
45. Why is blockchain mining said to consume resources and time?
a. It requires a few miners to solve complex mathematical problems due to the
cryptographic hash function that is being used recursively.
b. The process of merkle tree root for the transactions is too time-consuming, as such, the
mining of such process explains why.
c. It is too complex to identify the data.
d. None of the above.
B. Public chain is permissionless, consortium chain allows for different access rights
suited for organisation collaborations and private chain needs permission that is mostly
used within an organisation itself.
C.
For suppliers: ease the lack of credit and increases sales
For core enterprises: optimise working capital, reduce supply chain risks and reduce
operational costs
For financial institutions: Service SMEs and provides effective risk control
A.
Opportunities Challenges
Improves transparency Technological Risk
Improves security Scalability problems
Lowers costs Regulatory issues